Privacy Bibliography
Privacy Bibliography
Send suggestions
Last modified: September 22, 1995
-
(Note) (1987). Privacy, Computers, and the Commercial Dissemination of
Personal Information. Texas Law Review, 65, 1395-.
(Note) (1981). The Right to Privacy in Nineteenth Century America. Harvard
Law Review, 94, 1892-.
Agre, P. E. (1994). Surveillance and Capture: Two Models of Privacy. The
Information Society, 10(2), 101-27.
Allen, A. L. (1991). The Power of Private Facts. Case Western Law Review,
41(3), 757-768.
Alpert, S. (1995). Privacy and Intelliegent Highway: Finding the Right
of Way. Santa Clara Computer and High Technology Law Journal, 11(1).
Amsterdam, A. G. (1974). Perspectives on the Fourth Amendment. Minnesota
Law Review, 58, 349-403.
Arendt, H. (1958). The Human Condition. Chicago: University of Chicago
Press.
Barrington Moore, J. (1984). Privacy: Studies in Social and Critical History.
Armonk: M.E. Sharpe.
Bazelon, D. L. (1977). Probing Privacy. Gozanga Law Review, 12(4), 587-619.
Benn, S. I. (1988). A Theory of Freedom. Cambridge: Cambridge University
Press.
Bennett, C. J. (1992). Regulating Privacy: Data Protection and Public Policy
in Europe and the United States. Ithica: Cornell University Press.
Bezanson, R. P. (1992). The Right to Privacy Revisited: Privacy, News,
and Social Change, 1890-1990. California Law Review, 80(5), 1133-75.
Bloustein, E. J. (1964). Privacy as An Aspect of Human Dignity: An Answer
to Dean Prosser. New York University Law Review, 39, 962-1007.
Bloustein, E. (1978). INDIVIDUAL AND GROUP PRIVACY.
Brill, A. (1990). Nobody's Business: The Parodoxes of Privacy. Reading:
Addison-Wesley.
Burnham, D. (1983). The Rise of the Computer State. New York: Random House.
Chaum, D. (1992). Achieving Electronic Privacy. Scientific American(August
1992).
Commission, P. P. S. (1977). Personal Privacy in an Information Society.
Washington, DC:
Communities, C. o. t. E. (1995). Amended Proposal for a Council
Directive on the Protection of Individuals with Regard to the Processing
of
Personal Data and on the Free Movement of Such Data, COM(92)--SYN 287.
In
Davies, S. (1992). Big Brother: Australia's Growing Web of Surveillance.
Sydney: Simon & Schuster.
Elder, D. A. (1991). The Law of Privacy. Rochester: Lawyer's Cooperative
Publishing.
Ellul (1964). The Technological Society. New York: Vintage Books.
Emerson (1979). The Right of Privacy and Freedom of the Press. Harvard
Civil Rights Civil Liberties Law Review, 14, 329.
Europe, C. o. (1981). Convention for the Protection of Individuals with
Regard to Automatic Processing of Personal Data, no. 108. In "European
Convention"
Flaherty, D. (1972). Privacy in Colinial New England. Charlottesville:
University of Virgnia Press.
Flaherty, D. (1984). The Need for a Privacy Protection Study Commission.
Government Information Quarterly, 1, 235-58.
Flaherty, D. (1989). Protecting Privacy in Surveillance Societies. Chapel
Hill: University of North Carolina Press.
Fried, C. (1968). Privacy (A Moral Analysis). Yale Law Journal, 77(1),
475-93.
Froomkin, A. M. (1995). The Metaphor is the Key: Cryptography, the Clipper
Chip, and the Constitution. University of Pennsylvania Law Review, 143,
709-.
Froomkin, A. M. (1995). Anonymity and its Enmities. Journal of Online Law,
1995(art. 4).
Gandy, O. H., & Simmons, C. (1986). Technology, Privacy and the Democratic
Process. Critical Studies in Mass Communications, 3(June 1986), 155-168.
Gandy, O. H. (1993). The Panoptic Sort: A Political Economy of Personal
Information. Boulder, San Francisco, Oxford: Westview Press.
Garfinkel, S. (1994). PGP: Pretty Good Privacy. Sebastapol, CA: O'Reilly
& Associates.
Gavison, R. (1980). Privacy and the Limits of Law. Yale Law Journal, 89,
421-71.
Gellman, R. M. (1993). Fragmented, Incomplete, and Discontinuous: The Failure
of Federal Regulatory Proposals and Institutions. Software Law Journal,
6.
Glancy, D. J. (1979). The Invention of the Right to Privacy. Arizona Law
Review, 21(1), 1-39.
Goffman, E. (1959). The Presentation of Self in Everyday Life. Garden City:
Doubleday.
Goffman, E. (1961). Asylums. Garden City: Doubleday.
Goffman, E. (1963). Behavior in Public Places. New York: Free Press.
Gross (1967). The Concept of Privacy. New York University Law Review, 42,
34.
Habermas, J. (1962). The Structural Transformation of the Public Sphere.
Cambridge: MIT Press.
Halpern, S. W. (1988). The Law of Defemation, Privacy, Publicity and 'Moral
Rights'. Cincinnati: Anderson Publishing Co.
Halpern, S. W. (1995). The Traffic in Souls: Privacy Interests and the
Intelligent Vehicle Highway Systems. Santa CLara Computer and High Technology
Law Journal, 11(1).
Harris, L. a. A. (1984). The Road After 1984. Southern New England Telephone.
Henkin, L. (1974). Privacy and Autonomy. Columbia Law Review, 74, 1410-33.
Hixson, R. F. (1987). Privacy in Public Society: Human Rights in Conflict.
New York: Oxford University Press.
Hoffman, L. (Ed.). (1980). Computers and Privacy in the Next Decade.
New York: Academic Press.
Hondius, F. (1980). Data Law in Europe. Stanford Journal of International
Law, 16, 87-113.
House Committee on Government Operations (1966). Computers and the Invasion
of Privacy No. 89th Cong. 2d Sess.). US Congress.
Kalven (1966). Privacy in Tort Law: Were Warren and Brandeis Wrong? Law
and Contemporary Problems, 31, 326-.
Karst, K. (1966). 'The files': Legal Controls Over the Accuracy and Accessibility
of Stored Personal Data. Law and Contemporary Problems, 31, 341-76.
Karst, K. (1980). Freedom of Intimate Association. Yale Law Journal, 89,
624-92.
Kirby, M. (1980). Transborder Data Flows and the 'Basic Rules' of Data
Privcy. Stanford Journal of International Law, 16, 27-66.
LaFave, W. R. (1987 & Supp. 1994). Search and Seizure.
Lebron, D. W. (1991). The Right to Privacy's Place in the Intellectual
History of Tort Law. Case Western Law Rewiew, 41(3), 769-810.
Linowes, D. F. (1989). Privacy in America: Is Your Private Life in the
Public Eye?
McCarthy, J. (1987). The Rights of Privacy and Publicity.
Michael, J. (1994). Privacy and Human Rights 1994. Dartmouth (UK), UNESCO
(Paris).
Miller, A. (1971). The Assault on Privacy. Ann Arbor: University of Michigan.
Neier, A. (1975). Dossier: The Secret Files They Keep on You. New York:
Stein and Day.
Packard, V. (1964). The Naked Society. New York: Pocket Books.
Posner, R. (1978). An Economic Theory of Privacy. Regulation(May/June),
19-26.
Posner, R. (1978). The Right of Privacy. Georgia Law review, 12, 393-422.
Posner, R. A. (1978). An Economic Theory of Privacy. Regulation(May/June),
19-26.
Posner, R. (1979). Privacy, Secrecy and Reputation. Buffalo Law Review,
28, 1-55.
Post, R. C. (1989). The Social Foundations of Privacy: Community and Seld
in the Common Law Tort. California Law Review, 77, 957.
Post, R. C. (1991). Rereading Warren and Brandeis: Privacy, Property, and
Appropriation. Case Western Law Review, 41(3), 647-680.
Prosser, W. (1960). Privacy. California Law Journal, 48(2), 383-423.
Radin, P. (1982). Property and Personhood. Stanford Law Review, 34, 957-.
Radin, P. (1987). Market-Inalienability. Harvard Law Review, 100, 1849-.
Regan, P. (1995). .
Reidenberg, J. R. (1992). Privacy in the Information Economy: A Fortress
or Frontier for Individual Rights? Federal Communication Law Journal, 44(2),
195-243.
Reiman, J. (1995). Driving to the Panopticon. Santa Clara Computer and
High Technology Law Journal, 11(1).
Rotenberg, M. (1991). The Use of the Social Security Number as a National
Identifier. Computers & Society, 21(2-4), 13-19.
Rothfeder, J. (1992). Privacy for Sale: How Computerization Has Made Everyone's
Private Life an Open Secret. New York:
Rubenfeld, J. (1989). The Right of Privacy. Harvard Law Review, 102, 737.
Rule, J. (1974). Private Lives and Public Surveillance: Social Control
in the Computer Age. New York: Schocken Books.
Samarajiva, R. (1994). ?? .
Schauer, F. (1991). Reflections on the Value of Truth. Case Western Law
Review, 41(3), 699-724.
Schneier, B., & Banisar, D. (forthcoming). Clipping Privacy. New York:
John Wiley.
Schoeman, F. D. (Ed.). (1984). Philosophical Dimensions of Privacy:
An Anthology. Cambridge: Cambridge University Press.
Schwartz, P. (1992). Data Processing and Government Administration: The
Failure of the American Legal Response to the Computer. Hastings Law Journal,
43(5), 1321-89.
Schwartz, P. (1995). The Protection of Privacy in Health Care Reform. Vanderbilt
Law Review, 48, 295.
Scott, G. G. (1995). Mind Your Own Business: The Battle for Personal Privacy.
New York: Insight Books/Plenum Press.
Seipp, D. (1978). The Right to Privacy in American History.
Shattuck, J. (1977). Rights of Privacy. .
Shattuck, J. (1984). In the Shadow of 1984: National Identification Systems,
Computer-Matching and Privacy in the United States. Hastings Law Journal,
35(July 1984), 1002.
Simitis, S. (1987). Reviewing Privacy in an Information Society. University
of Pennsylvania Law Review, 135, 707-46.
Smith, R. E. (1980). Privacy: How to Protect What's Left Of It. Garden
City: Anchor Books.
Smith, H. J. (1994). Managing Privacy: Information Technology and Corporate
America. Chapel Hill: University of North Carolina Press.
Smith, R. E. (1994). Our Vanishing Right to Privacy. Loompanics.
Trubow, G. B. (1990). Protecting Informational Privact in the Information
Society. Northern Illinois Law Review, 10(2), 521-42.
Turkington, R. C. (1990). Legacy of the Warren and Brandeis Article: The
Emerging Unencumbered Right to Informational Privacy. Northern Illinois
University Law Review, 10(2), 479-520.
Wacks (1980). The Poverty of Privacy. Law Quarteryl Review, 96, 73.
Warren, S. a., & Brandeis, L. (1890). The Right to Privacy. Harvard
Law Review, 4(1), 193-220.
Weiss, M. J. (1988). The Clustering of America. New York: Harper &
Row.
Weitzen, H. S. (1988). Infopreneurs: Turning Data Into Dollars. New York:
John Wiley.
Westin, A. (1966). Science, Privacy and Freedom. Columbia Law Review, 66,
1003.
Westin, A. (1967). Privacy and Freedom. New York: Atheneum.
Westin, A. a. M. A. B. (1972). Databanks in a Free Society: Computers,
Record-keeping, and Privacy. New York: Quadrangle Books.